Debian DSA-2548-1 : tor - several vulnerabilities

medium Nessus Plugin ID 62086

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in Tor, an online privacy tool.

- CVE-2012-3518 Avoid an uninitialised memory read when reading a vote or consensus document that has an unrecognized flavour name. This could lead to a remote crash, resulting in denial of service.

- CVE-2012-3519 Try to leak less information about what relays a client is choosing to a side-channel attacker.

- CVE-2012-4419 By providing specially crafted date strings to a victim tor instance, an attacker can cause it to run into an assertion and shut down.

Additionally the update to stable includes the following fixes: when waiting for a client to renegotiate, don't allow it to add any bytes to the input buffer. This fixes a potential DoS issue [ tor-5934, tor-6007].

Solution

Upgrade the tor packages.

For the stable distribution (squeeze), these problems have been fixed in version 0.2.2.39-1.

See Also

https://security-tracker.debian.org/tracker/CVE-2012-3518

https://security-tracker.debian.org/tracker/CVE-2012-3519

https://security-tracker.debian.org/tracker/CVE-2012-4419

https://trac.torproject.org/projects/tor/ticket/5934

https://trac.torproject.org/projects/tor/ticket/6007

https://packages.debian.org/source/squeeze/tor

https://www.debian.org/security/2012/dsa-2548

Plugin Details

Severity: Medium

ID: 62086

File Name: debian_DSA-2548.nasl

Version: 1.10

Type: local

Agent: unix

Published: 9/14/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tor, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 9/13/2012

Reference Information

CVE: CVE-2012-3518, CVE-2012-3519, CVE-2012-4419

DSA: 2548